Insiders pose the most substantial threat to organizations everywhere, a recent across-the-board study conducted by IBM demonstrates. Although in the majority of the cases, the insider is an employee of the company, he could also be a third party, such as an external contractor, a consultant or a business partner. 729 more words

A former Expedia IT professional admitted on Monday to illegally trading on secrets he discovered by hacking his own company’s senior executives. Jonathan Ly stole passwords and infiltrated devices of Expedia’s ( 32 more words

NSA contractor arrest highlights challenge of insider threat. From Washington Times. The arrest of a National Security Agency contractor for allegedly stealing classified information was the second known case of a government contractor being publicly accused of removing secret data from theintelligence agency since 2013.

Since the heist became public knowledge through media reports in the Philippines, nearly a month after it happened, two theories have been suggested to explain how the thieves managed to send the New York Fed 35 properly authenticated SWIFT transfer orders. 282 more words